首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
一种基于整数小波变换的彩色图像盲水印技术   总被引:1,自引:0,他引:1  
提出了一种在静止的彩色图像中嵌入盲水印的鲁棒算法,用彩色图像作为数字水印的载体,将有意义的二值图像作为水印图像,利用人类视觉系统(HVS)特性,综合考虑水印的鲁棒性和不可见性,将水印信息嵌入到小波分解的低频域(LLn),通过理论分析和实验结果证明:算法满足水印的抗JPEG压缩攻击、复杂度较低、实用性较强、对原图的影响较小,具有可行性和有效性等特点。  相似文献   

2.
A novel semi-fragile watermarking scheme for the content authentication of images using wavelet transform (WT) is presented in this paper. It is tolerant to the embedded wavelet image compression methods based on WT such as embedded zerotree wavelet (EZW), set partitioning in hierarchical trees (SPIHT) and embedded block coding with optimized truncation (EBCOT) in JPEG2000 to a pre-determined bit-plane, but is sensitive to all other malicious attacks. The image features are generated from the lowest-frequency (LF) subband of the original image as the embedded watermark. The watermark is embedded into the pre-determined bit-plane by adjusting the corresponding values in the given subband. In the process of watermarking authentication, we compare the image features generated from the LF subband of the received image with the embedded watermarking information (the image features of the original image) extracted from the pre-determined bit-plane in the given subband of the received image to decide whether the image is attacked maliciously or processed acceptably (the embedded wavelet compression). The most important advantage of our watermarking scheme is that the watermark information can be extracted from the watermarked image when detecting watermark, so the received image authentication needs no information about the original image or watermark. Experimental results prove the effectiveness of our proposed watermarking scheme.  相似文献   

3.
DWT-Based Robust Color Image Watermarking Scheme   总被引:1,自引:0,他引:1  
A scheme of embedding an encrypted watermark into the green component of a color image is proposed. The embedding process is implemented in the discrete wavelet transformation (DWT) domain, The original binary watermark image is firstly encrypted through scrambling technique, and then spread with two orthogonal pseudo-random sequences whose mean values are equal to zero, and finally embedded into the DWT low frequency sub-band of green components, The coefficients whose energies are larger than the others are selected to hide watermark, and the hidden watermark strength is determined by the energy ratio between the selected coefficients energies and the mean energy of the subband. The experiment results demonstrate that the proposed watermarking scheme is very robust against the attacks such as additive noise, low-pass filtering, scaling, cropping image, row (or column ) deleting, and }PEG compression.  相似文献   

4.
研究了一种新的基于小波变换的数字水印技术。该项技术中,把强健水印嵌入至一幅图像中频率最低的部分,用于检测图像是否发生改变的脆弱水印则在较为粗糙的尺度下,通过对小波系数设置阈值及量化的方法嵌入到图像中。实验表明,强健水印具有抵抗非恶意图像变换(如有损压缩等),而脆弱水印能检测到恶意的图像攻击(如修改或伪造图像中的某一部分)。  相似文献   

5.
常规的数字水印算法对几何攻击无能为力,水印算法对几何攻击的鲁棒性被认为是数字水印技术走上实际应用的一个关键点.文中通过对普通的基于几何不变性数字水印算法的分析,提出了一种彩色图像中基于几何不变性的数字水印的嵌入及检测过程,并通过一系列实验证明了该数字水印算法具有很高的抗几何攻击(旋转、缩放等)特性,即提高了鲁棒性.  相似文献   

6.
提出了一种基于小波系数分段的数字水印算法,该算法对常见的图像处理具有一定强度的鲁棒性,并且该算法实现了完全盲检测,水印提取时不需要原始的载体图像,也不需要水印的任何信息,并且提取水印的正确性高.  相似文献   

7.
提出一种基于水印序号的抗裁剪音频数字水印算法.该算法在音频信号中嵌入同步码、水印序号和二值水印图像,具有如下特点:利用同步技术,能有效对抗音频信号受到的随机裁剪攻击;水印序号的嵌入,能使检测到的水印信息自动定位在图像上.仿真实验表明,该算法在抵抗加性噪声和裁剪攻击等方面达到了较高的鲁棒性.  相似文献   

8.
基于图像连通性的自适应水印同步方案   总被引:2,自引:2,他引:2  
为提高水印的鲁棒性和安全性,提出了基于图像连通性的自适应水印同步方案.该方案根据图像的连通性得到连通对象,选取较大的连通对象的重心作为水印嵌入的参考点.利用图像的连通性具有拓扑不变性以及图像的重心比较稳定的特性保证水印检测的自适应同步.用作水印嵌入的参考点的高度稳定性,使得该方案不仅对常见图像处理时,而且对全局和局部几何攻击均呈现了较强的鲁棒性.  相似文献   

9.
基于DCT与DWT的水印算法的比较分析   总被引:1,自引:0,他引:1  
数字水印技术是保护数字媒体安全的一种有效手段,但当前对数字水印技术的研究还有待进一步加强。文章阐述了数字水印技术的基本原理,介绍了离散余弦变换(DCT)和离散小波变换(DWT)水印算法,并通过攻击实验,对DCT和DWT水印技术在不可见性、鲁棒性、水印容量等方面进行了比较分析,以期对推进数字水印技术的发展起到一定的积极作用。  相似文献   

10.
Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression, fragile to malicious tampering and capable of recovery. We embed the watermark bits in the direct current value of energy concentration transform domain coefficients. Let the original watermark bits be content dependent and apply error correction coding to them before embedded to the image. While indicating the tampered area, the extracted bits from a suspicious image can be further decoded and then used to roughly recover the corresponding area. We also theoretically study the image quality and bit error rate. Experimental results demonstrate the effectiveness of the proposed scheme.  相似文献   

11.
基于双置乱与奇异值分解的彩色图像水印算法   总被引:2,自引:1,他引:1  
提出了一种基于水印和载体双双置乱的安全水印算法。首先将载体图像由RGB色彩空间转换为YUV彩色空间,再经Fibonacci变换置乱后,对Y分量进行8×8分块,对各块进行奇异值分解。将二值图像经过Arnold置乱后嵌入到Y分量的各块的奇异值中。经仿真实验证明,该算法对JPEG压缩、剪切、旋转、滤波等几何攻击具有比较好的稳健性。  相似文献   

12.
数字水印技术作为版权保护的重要手段,已得到广泛地研究和应用.提出了一种基于Arnold混沌映射的数字水印技术和水印信息置乱效果评价方法,用Arnold变换对原始水印信号进行置乱,再经过M序列扩频,将处理后水印信号嵌入宿主图片小波域的低频系数中,通过对四组不同条件和嵌入方法的比较,通过实验证明该算法具有良好的稳健性.  相似文献   

13.
Novel Blind Robust Watermarking Based on Chaotic Mixing   总被引:1,自引:0,他引:1  
This paper proposed a novel blind robust watermarking scheme. Multi-bits watermark is embedded in the chaotic mixed image blocks. Energy of the watermark is spread to all region of the blocks instead of some individual pixels, which entitles the watermark with imperceptibility and high robustness. A class of 1-D Markov chaotic maps is employed to perform image block mixing and watermark encryption ensures security of the system.To prove the validity of this proposed scheme, some objective comparisons with the popular spread spectrum scheme were also presented. The simulation results show that this scheme can survive processing such as high-ratio JPEG compression, Gaussian noise pollution and histogram equalization.  相似文献   

14.
阐述了图像数字水印和小波变换的基本原理,通过对小波基、分解级数、小波系数选择及人类视觉掩蔽特性等的分析,提出了一种基于小波变换自适应图像数字水印算法.通过剪切、加噪、滤波、锐化、模糊等几种常用攻击技术对算法进行了测试,实验结果表明该算法具有较强的鲁棒性.  相似文献   

15.
Fragile watermarking is a method to verify the integrity and authenticity of multimedia data. A new fragile watermark for image was proposed, which can be used in image verification applications. The paper first described the above two techniques, some of which will be used in the method. Then it described the embedding and authentication process and also analyzed the method to show how it can survive some attacks. The experimental results show that the proposed method doesn‘t need the watermark or original image on authentication side. It provides more security against attack, and can localize where the temoerinlz has occurred.  相似文献   

16.
基于小波变换的数字水印技术是当前的一个研究热点,本文系统分析和总结了基于小波域的数字水印算法,并根据水印算法的特点对其进行了分类,详细分析了各类水印算法的各种嵌入和检测技术以及各自的优缺点,最后给出了图像水印算法的测试结果.  相似文献   

17.
提出了一种基于人眼视觉特性的小波变换数字水印算法,该算法能够依据人眼视觉特性,将水印信息嵌入到小波变换域的不同尺度、不同方向分量上,从而提供检测局部空域和频域变化的能力,实现局部水印和全局水印之双重目的.实验结果表明:所提出的数字水印不仅具有较好的透明性,而且对诸如剪切、低通滤波等攻击均具有较好的鲁棒性.  相似文献   

18.
Connectivity-Based Watermarking Robust to Geometrical Attacks   总被引:2,自引:0,他引:2  
Introduction Thegoalofdigitalwatermarkingtechniqueisto embedsomeunnoticeableinformation(calleda mark)inthecontentofmediainordertoprotect copyrightorauthenticateintegralityandverity.Many robustwatermarkingtechniqueshavesuccessfullyre sistednotonlycommonsig…  相似文献   

19.
In order to increase the watermarking capacity and improve the anti-counterfeiting performance of quick response (QR) two-dimensional (2D) barcode based on digital watermarking technique, this paper proposes a kind of graying algorithm for binary image to make transform domain watermarking methods possible. Based on the graying algorithm, the quantization-based watermarking scheme in discrete wavelet transform (DWT) domain is then designed. The experiments show that the proposed watermarking scheme for QR 2D barcode greatly improves anti-counterfeiting performance without loss of any barcode information.  相似文献   

20.
基于DCT-SVD的抗几何攻击图像水印算法   总被引:1,自引:0,他引:1  
针对DCT域的最优均值量化盲水印算法抵抗剪切、旋转、缩放等几何攻击的能力不强,给出了一种DCT-SVD图像水印算法.该算法利用奇异值具有几何不变性,使算法具有较好抗几何攻击性能.实验结果表明,该算法对加噪、JPEG压缩、滤波、几何攻击等多种攻击都具有很强的鲁棒性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号